Connected Car Security

Confidence powered by secured connections

Smarter Security for Smart Cars

Cars are changing. Smart cars, cars that adopted ICT for an easier and safer driving, are now being commercialized. Now, a car becomes a wheeled data center and the car manufacturer becomes a software developer. However, as more and more components of cars become connected to the Internet, risk will greatly widen. Hackers can remotely access and manipulate functions in the car including in-vehicle information systems, automatic braking systems, or even cutting off the engine while the vehicle is in transit.

Networks of Consideration for Connected Car Security

There are different networks that one needs to consider when thinking about car security – not simply within the vehicle in itself.

V2V = Vehicle-to-Vehicle:

Through the Communication Control Unit (CCU), a car can communicate with another car to transfer traffic-related information, including traffic status. Communication between a car and a neighboring car helps to prevent car accidents in advance and allows the car to be driven in a more secure way through a temporary network, including roadside units and cars.

V2I : Vehicle-to-Infrastructure

Through road-side units (RSUs) that communicate with cars, smart cars can configure a comprehensive network and be provided with various services. The RSU communicates with cars on the road to reduce traffic and provides drivers with an agile navigation system. An Information Transportation System (ITS) is configured by integrating the elements of the existing traffic systems such as cars, RSUs, and roads and signaling systems. Through the ITS, the efficiency and safety of traffic can be enhanced dramatically.

V2D : Vehicle-to-Device

A driver can figure out the status of the car and which element should be maintained by using a smart device such as smartphone or tablet. In addition, he or she can even control the car remotely from that device.

The Need For a Solution

Threat to these networks pose a very real threat to human life. As car manufacturers roll out new features and update the code, they need to keep security at the forefront. This presents challenges for developers as the development lifecycle for cars takes long to complete. Vehicle programming also contains some of the most complicated coding in all computer technology.

At Penta Security, we saw the dangers and began work on researching security for exposed areas. Considering all gateways or points of access for the car and developing methods of securing the channels of communication via encryption, we also delved into public key infrastructure (PKI) to authenticate the many different endpoints . This comprehensive connected car security solution resulted in AutoCrypt.

Support for user authentication between nomadic devices and authentication server

2012

Security for Police Car Fleet Management

Location information of police vehicles, if stolen, can compromise the safety and integrity of law enforcement agencies. In 2012, Penta Security worked to hide critical patrol vehicle GPS data from any unauthorized entities.

Provide an encrypted communication channel for law enforcement administrators to monitor GPS data on patrol cars

Client featured IEEE1609.2/CAMP and communicated with one another through Wireless Access in Vehicular Environment (WAVE)

2014

Vehicle Data Monitoring System (VDMS) Security

Penta Security developed security modules (or agents) for vehicles and in the back-end network. This allowed for the authentication of vehicles and service providers, as well as providing security for communications between them.

Design and install modules

Provide consulting for the design of Authentication Infra-System

Provide solution for AIS Certificate Issuing

2015

AutoCrypt® Launched

Penta Security’s proprietary core technologies, our experience working with cars from 2007, and the vehicle industry’s evolving requirements resulted in the launch of AutoCrypt® in 2015. From architecture design to security against external attacks, AutoCrypt® is a comprehensive suite of solutions for connected and autonomous cars.

External and internal firewalls to mitigate attacks from outside of the vehicle

2016

AutoCrypt® Tested on Smart Highways

Government agencies all over the world are taking a serious look at the what the future looks like with smarter cars and smarter highways. With support from the Korean government, AutoCrypt® has been tested for its security on Intelligent Transport Systems (ITS) since 2016.

2017

Security for Electric Vehicle (EV) Charging Systems

IoT is coming to electric car charging stations, and promises convenience for drivers, EV manufacturers, and service providers. On the other hand, all this convenience comes with the price of new vectors of vulnerability for hackers to use. AutoCrypt® can provide EV owners, manufactures and service providers the reassurance necessary to communicate amongst each other with trust and confidence.

Provide infrastructure for accurate EV charging

Reliable billing for EV charging authority and other service providers

Electronic equipment controls all areas of a vehicle, including driving, brakes, steering, and various sensors. The vehicles manufactured these days are mounted with more than 100 Electronic Control Units (ECUs). An automotive company uses information collected from the ECUs to manufacture a safer and more convenient vehicle, and a driver can be provided with automated value-added services based on the vehicle driving information.

However, unencrypted information is transferred to the internal network of the vehicle. The impossibility of ensuring data integrity means that someone other than the driver may manipulate the vehicle remotely. If someone threatens a driver’s life by malfunctioning the steering device or stopping the engine while the driver is driving a car, it may lead to a disaster affecting other vehicles, pedestrians, and surrounding infrastructure.

The security accident of a company is just the loss of information; however, the security accident of a smart car can threaten people’s lives. For vehicle security, security should always come before connectivity.

Download our free infographic to find out more about the different channels vulnerable to hacking, and how AutoCrypt can prevent these attacks.